We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called TUBA for monitoring a user's typing patterns. We evaluate the robustness of TUBA through comprehensive experimental evaluation including two series of simulated bots. Support vector...
View full abstract»

The prosperity of the Internet has made it attractive to hackers and malicious attackers. Internet worms have become one type of major threats to the network infrastructure. Distributed defense collaborating with single-point-deployed security applications over multiple network domains are promising. However, most of the reported collaborative schemes for distributed defense are application-specif...
View full abstract»

Intrusion detection and response systems (IPSs) for protecting against distributed denial-of-service (DDoS) attacks will beneflit significantly if all the routers within each autonomous system (AS) are capable of detection and response in addition to sampling. However, DDoS detection and response will incur high storage and processing overhead if each router does redundant detection and response t...
View full abstract»

Nowadays, most proxy signature schemes are based on the difficulty of DLP (Discrete Logarithm Problem) or ECDLP (Elliptical Curve Discrete Logarithm Problem). As though many proxy signature schemes based on DLP or ECDLP have been proposed, it makes us discouraged that some disadvantages can be found after a new or modified proxy signature scheme was designed after short time. How to solve the ques...
View full abstract»

With the growth of Massively Multiuser Virtual Environments (MMVEs) and increasingly interactive social net working platforms, it is widely accepted that their convergence renders today's centralized hosting approaches impracticable. To handle virtual environments of such massive scale, decentralized systems are necessary that also involve the resources of clients. The expedient design of techniqu...
View full abstract»

Distributed Virtual Environments (DVE) have become increasingly popular over the last few years. Examples of DVEs are Massively Multiplayer Online Games (MMOGs), distributed interactive simulations, and shared virtual worlds. The service providers of DVEs need to ensure that certain Quality of Service (QoS) (messages delivered within a threshold delay) is guaranteed for the users participating in ...
View full abstract»

The development and production of consumer goods is increasingly affected by a world-wide distribution and specialization of development and production locations. Efficient IT tools are required for synchronizing decision makers, developer teams and production planners. In this paper we present the design and evaluation of our virtual workspace for supporting the collaboration of team members in g...
View full abstract»

Immersive and interactive Massive Multiuser Virtual Environments currently attract a lot of attention. Going beyond the hype, one discovers interesting concepts and opportunities for a supposed future Web which is commonly called the 3D Web. The global provision of such a vision is much more than just another evolutionary step in content visualization, rather severe technical challenges need to be...
View full abstract»

With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN leverages a key management technique to enable a user to simply post encrypted contents so that only users who can satisfy the associate security policy can derive the key to access th...
View full abstract»

A social network is a collection of social entities and the relations among them. Collection and sharing of such network data for analysis raise significant privacy concerns for the involved individuals, especially when human users are involved. To address such privacy concerns, several techniques, such as k-anonymity based approaches, have been proposed in the literature. However, such approaches...
View full abstract»

Protection of On-line Social Networks (OSNs) resources has become a primary need since today OSNs are the hugest repository of personal information on the Web. This has resulted in the definition of some access control models tailored to the protection of OSN resources. One of the key parameter on which access control decisions in OSNs should be based is represented by the trust between OSN users....
View full abstract»

In this (invited) paper, we present a work in progress social library and reference management system called SoJa (Social Jabref), which is realized on top of a decentralized (peer-to-peer) social information system. The contribution of the work is multi-fold. It provides a platform to collaborate and socialize to carry out a specific task (managing and sharing bibliographic meta-information). Fro...
View full abstract»

Many collaborative editing systems have been developed for coauthoring documents. These systems generally have different infrastructures and support a subset of interactions found in collaborative environments. In this paper, we propose a transactional framework with two advantages. First, the framework is generic as demonstrated by its capability of modeling four types of existing products: RCS, ...
View full abstract»

The mobile phone technologies are becoming pervasive in recent years. These items such as IPhones, IPad and Androïds are very attractive since they provide relatively good resources for a mobile device. Several works aim at integrating desktop applications in these tools to make them closer to the real computer. However, adapting desktop applications to these tools is a challenging problem as they...
View full abstract»

Adaptive Educational Hypermedia systems (AEH) enhance learning by adaptation and personalisation. As a consequence, wide ranging knowledge and learning content are needed. Problems then emerge in the provision of suitable authoring tools to carry out the authoring process which is complex and time consuming. Based on the fact that former research studies on authoring have identified drawbacks in c...
View full abstract»

This paper presents RaisAware, a collaborative software development tool aimed at supporting the relationship between software architecture and coordination of software development activities. Our design is based on both dependency analysis of software development artifacts and software developers' activities. We describe the motivations behind this work, detail the design and implementation of Ra...
View full abstract»

Millions of new domains are registered every day and the many of them are malicious. It is challenging to keep track of malicious domains by only Web content analysis due to the large number of domains. One interesting pattern in legitimate domain names is that many of them consist of English words or look like meaningful English while many malicious domain names are randomly generated and do not ...
View full abstract»

With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. Two major obstacles to this process of data sharing are providing a common storage space and secure access to the shared data. ...
View full abstract»

In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cyber security. We believe that similar models will be applicable in numerous other domains. The term community in this context refers to a county or larger city size unit with a clearly demarcated geographical boundary aligned more or less with a governance boundary. Our cho...
View full abstract»

A major concern for deployment of location-based mobile systems is the ill-usage of mobile client's location data, which may imply sensitive and private personal information. Also, even if the location is exposed willingly by the mobile client the query should not be linked to the mobile client. Still, many location based systems (store finders, transit itinerary systems, and social networks) are ...
View full abstract»